Interactive Threat Intelligence Bot that leverages serverless framework, AWS/GCP, and Slack
☆27Nov 3, 2019Updated 6 years ago
Alternatives and similar repositories for Threat-Intel-Slack-Bot
Users that are interested in Threat-Intel-Slack-Bot are comparing it to the libraries listed below
Sorting:
- Pythonic library of Rewind.ai SQLite Database. Includes CLI and MCP interfaces.☆18Sep 5, 2025Updated 6 months ago
- ☆62Jul 31, 2018Updated 7 years ago
- Data Governance app for Splunk☆12Oct 19, 2023Updated 2 years ago
- MBC v2.x expressed in STIX 2.1 JSON☆16Oct 3, 2023Updated 2 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16May 21, 2021Updated 4 years ago
- ☆21Feb 10, 2021Updated 5 years ago
- Cross-platform VNC-based and Web-based Management for Citrix XenServer and Xen Cloud Platform☆38Dec 5, 2013Updated 12 years ago
- My personal Klipper config for my Longer LK4 Pro☆10Sep 11, 2021Updated 4 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- A ScienceLogic EM7 API client for Python☆15Jan 16, 2026Updated 2 months ago
- Fork of https://github.com/EdgarLopezPhD/PaySim☆17Jul 8, 2021Updated 4 years ago
- A set of scripts and analysis commands to harvest Tweets and identify content of interest, meaningful search criteria, and value keywords…☆22Oct 28, 2019Updated 6 years ago
- Reverse whois query tool☆11Jul 28, 2016Updated 9 years ago
- ☆16Sep 21, 2017Updated 8 years ago
- Curated UTF-8 URL-encoded character dictionary for injection testing, fuzzing, and bypass techniques against web applications and APIs, f…☆13Sep 20, 2021Updated 4 years ago
- Source code for Hacker101.com - a free online web and mobile security class.☆16Apr 28, 2022Updated 3 years ago
- A collection of notes and rules (Snort/Suricata, Sigma, and YARA) to identify various samples of malware.☆14Sep 7, 2021Updated 4 years ago
- ☆11Mar 9, 2016Updated 10 years ago
- A research project to use WebAuthn with Account Abstraction (ERC 4337)☆10Jul 16, 2024Updated last year
- ☆13Jun 1, 2021Updated 4 years ago
- Python tool for exploiting CVE-2021-35616☆11Dec 3, 2021Updated 4 years ago
- ☆22Jan 31, 2023Updated 3 years ago
- Technical add-on to ingest json formatted volatility memory analysis plugin outputs☆13May 21, 2018Updated 7 years ago
- Detection rules to look for Log4J usage and exploitation☆18Jun 21, 2025Updated 9 months ago
- ☆11Jan 16, 2018Updated 8 years ago
- Proof of Liabilities and Vote Delegation☆16Jun 28, 2018Updated 7 years ago
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆10Mar 22, 2018Updated 7 years ago
- Monitor collections of malicious Telegram bots used for phishing credential theft, to prevent frauds/dataleaks.☆17Jan 29, 2025Updated last year
- Sniper. Passive Secrets Hunting.🚬☆13Jun 3, 2022Updated 3 years ago
- AWS Backup implementation in terraform☆13Feb 8, 2020Updated 6 years ago
- Handle IOTA payments and more☆11May 30, 2021Updated 4 years ago
- An implementation of a Bitcoin Blockchain resolver for SPV over UDP DNS☆11Dec 9, 2017Updated 8 years ago
- Random tips and tricks RE: ransomware☆14Aug 17, 2021Updated 4 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- Create and destroy RAM disks easily on modern macOS - macOS 15+☆25Jul 7, 2025Updated 8 months ago
- SSLChecker is a serverless API written in Python and running on Azure Functions. SSLChecker is used to identify obsolete versions of SSL/…☆17Nov 12, 2020Updated 5 years ago
- A simple Ethereum dApp using ERC-721 token. Stack: Solidity Smart Contracts, Truffle Suite, Ganache, Web3.js, Ropsten test network and Re…☆12May 7, 2023Updated 2 years ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Aug 21, 2016Updated 9 years ago
- S3 Buckets that will let you list all files inside them☆14Apr 26, 2018Updated 7 years ago